Hacking WiFi through coWPAtty (Kali Linux)
Implementation of an offline dictionary attack against WPA/WPA2 networks using PSK-based authentication (e.g. WPA-Personal). Many enterprise networks deploy PSK-based authentication mechanisms for WPA/WPA2 since it is much easier than establishing the necessary RADIUS, supplicant and certificate authority architecture needed for WPA-Enterprise authentication. Cowpatty can implement an accelerated attack if a precomputed PMK file is available for the SSID that is being assessed
Above defination was technical….simply speaking…coWPAtty disconnects the currently connected user from wifi and for the user to reconnect it from wifi..as soon as user connects from wifi it steals the password….
cowpatty – WPA-PSK dictionary attack
genpmk – WPA-PSK precomputation attack
genpmk Usage Example
Use the provided dictionary file (-f /usr/share/wordlists/nmap.lst) to generate a hashfile, saving it to a file (-d cowpatty_dict) for the given ESSID (-s securenet):
NOTE: This is for educational purpose only we are not responsible for any type of inconvenience caused by reader.
Also Read :– Analyzing Packets in Wireshark
cowpatty Usage Example
Use the provided hashfile (-d cowpatty_dict), read the packet capture (-r Kismet-20140515-16-21-37-1.pcapdump), and crack the password for the given ESSID (-s 6F36E6):
Happy Pentesting/Hacking….. 🙂